Bug 415601 (CVE-2007-6279)

Summary: CVE-2007-6279 Double-frees via crafted FLAC file
Product: [Other] Security Response Reporter: Lubomir Kundrak <lkundrak>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: bnocera, mlichvar
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
URL: http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-6279
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2007-12-10 15:59:13 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Lubomir Kundrak 2007-12-07 13:22:10 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2007-6279 to the following vulnerability:

Multiple double-free vulnerabilities in Free Lossless Audio Codec (FLAC) libFLAC before 1.2.1 allow user-assisted remote attackers to execute arbitrary code via malformed (1) Seektable values or (2) Seektable Data Offsets in a .FLAC file.

References:

http://research.eeye.com/html/advisories/published/AD20071115.html
http://www.securityfocus.com/archive/1/archive/1/483765/100/200/threaded
http://www.kb.cert.org/vuls/id/544656
http://www.securitytracker.com/id?1018974

Comment 1 Lubomir Kundrak 2007-12-10 15:59:13 UTC
This flaw is not exploitable and can only cause an application to crash. Red Hat
does not consider unexploitable crash of flac application and applications that
use flac libraries such as media players to be a security issue.